MASP Chapter on Safety and Security

Similar documents
Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

Secure Product Design Lifecycle for Connected Vehicles

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT

Internet of Things Toolkit for Small and Medium Businesses

IEEE-SA Internet of Things - Security & Standards

Authentication with Privacy for Connected Cars - A research perspective -

Addressing Future Challenges in the Development of Safe and Secure Software Components The MathWorks, Inc. 1

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security

Security analysis and assessment of threats in European signalling systems?

SECURING DEVICES IN THE INTERNET OF THINGS

National Institute of Standards and Technology

Cyber-Physical Chain (CPChain) Light Paper

IoT & SCADA Cyber Security Services

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SECURITY OF CPS: SECURE EMBEDDED SYSTEMS AS A BASIS

Click ISO to edit Master title style Update on development of the standard

Professional Services Overview

Cyber security of automated vehicles

Cybersecurity ecosystem and TDL Antonio F. Skarmeta

Trusted Platform Modules Automotive applications and differentiation from HSM

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

Strong Security Elements for IoT Manufacturing

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061

SECURING DEVICES IN THE INTERNET OF THINGS

Security and Privacy in Car2Car Adhoc Networks

Introducing Cyber Resiliency Concerns Into Engineering Education

S1.1: RESEARCH AND DEVELOPMENT IN EUROPE FOR COMPETITIVE MANUFACTURING. Competitiveness of Industry by means of Cross Fertilisation

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost?

Autonomous Driving needs Safety & Security. Embedded World 2018 Dr. Ciwan Gouma

Securing the future of mobility

Cyber security mechanisms for connected vehicles

Secure Development Lifecycle

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Automotive Security An Overview of Standardization in AUTOSAR

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

IoT privacy risk management in ANASTACIA project

Functional Safety and Cyber-Security Experiences and Trends

The Road to Industry 4.0

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

K12 Cybersecurity Roadmap

SEGRID storyline. Workshop SEGRID November 14 th, 2016, Barcelona, Spain

Resilient Smart Grids

Innovation policy for Industry 4.0

Integrated Security Destination Area Workshop May

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Windows IoT Security. Jackie Chang Sr. Program Manager

Security in sensors, an important requirement for embedded systems

TARGET2-SECURITIES INFORMATION SECURITY REQUIREMENTS

Cybersecurity eit. Software. Certification. Industrial Security Embedded System

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

Cyber Security Technologies

FORTIKA - Cyber Security Accelerator for trusted SMEs IT Ecosystems THE PROJECT

Automotive Security Standardization activities and attacking trend

Automotive Gateway: A Key Component to Securing the Connected Car

Cyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies

[NEC Group Internal Use Only] IoT Security. - Challenges & Standardization status. Sivabalan Arumugam.

Grid Modernization Challenges for the Integrated Grid

Summary of Cyber Security Issues in the Electric Power Sector

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Connecting Securely to the Cloud

Security Challenges with ITS : A law enforcement view

Boston Chapter AGA 2018 Regional Professional Development Conference Cyber Security MAY 2018

Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation

Introduction to Device Trust Architecture

Cybersecurity for IoT to Nuclear

The SPARKS Project Motivation, Objectives and Results

Spotlight on IoT Security. Choose the right security for the Internet of Things.

13W-AutoSPIN Automotive Cybersecurity

Meeting FFIEC Meeting Regulations for Online and Mobile Banking

Digital Trust Ecosystem

Comprehensive Cyber Security Features in SIPROTEC & SICAM. SIPROTEC Dag 11. Mei 2017

Exposing vulnerabilities in electric power grids: An experimental approach

NATIONAL DEFENSE INDUSTRIAL ASSOCIATION Homeland Security Symposium

BEYOND TRADITIONAL PASSWORD AUTHENTICATION: PKI & BLOCKCHAIN

Security in grid control centers: Spectrum Power TM Cyber Security

Mobile Security Fall 2012

Securing IoT with the ARM mbed ecosystem

Cisco Connected Factory Accelerator Bundles

Functional Safety and Safety Standards: Challenges and Comparison of Solutions AA309

QUANTUM SAFE PKI TRANSITIONS

Security Aspects of Trust Services Providers

CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS

5G Revolution & Service security in Korea

Institute of Internal Auditors 2018 IIA CHICAGO CHAPTER JOIN NTAC:4UC-11

Securing Devices in the Internet of Things

Functional Safety and Cyber Security Experiences and Trends

AUTOMOTIVE FUNCTIONAL SAFETY: ACCELERATING INNOVATION THROUGH COOPERATION AND CONSENSUS IN STANDARDS

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

Modelling Cyber Security Risk Across the Organization Hierarchy

Keys to a more secure data environment

Don t Be the Developer Whose Rocket Crashes on Lift off LDRA Ltd

Economic and Social Council

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Transcription:

MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu

MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio Escobar antonio.escobar@infineon.com VIRTUAL VEHICLE

MASP 2017 ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 3

Scope Safety Absence of catastrophic consequences on humans and the environment Security Degree of resistance to or protection from harm are both important criteria for dependability of Cyber-physical system (CPS) Embedded systems Industry 4.0 or Internet-of-things (IoT) environments Heterogeneous & contradictory requirements: 24/7 reliability, 100% availability, 100% connectivity, real-time response, safety-critical Goal: Achieve acceptable compromise between all criteria of reliability. ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 4

Scope Domains Systems engineering Software engineering Hardware engineering Electric/electronic systems Extended scope for complex systems: Mechanical, thermo-dynamic, mechatronic, Concept phase Safety Hazards Security Threats System Systematic faults Vulnerabilities Hardware Software Faults, safety mechanism Software architecture correct Open HW interfaces, security mechanism Software architecture correct Methods Safety/security/reliability/dependability engineering Challenges: 1. Exploit expertise from each needed domain 2. Merge multiple aspects into single product ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 5

Objectives Design challenges Low-cost, reliable, minimally redundant hardware Reliable software Rigorous qualification procedures Assess known failures, system malfunctions, subsequent failures New product development vs. changes & modifications Minimize re-certification cost Verification & validation Especially for connected and highly networked systems Better methods and tools Supporting (incremental) certification Achieve cost-savings ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 6

Objectives Security & privacy by design Affects entire product life cycle, not just development Data loss, misuse, unwanted modification, unauthorized access Quantified verification For safety & security Definition of standard metrics & targets Measurable methods needed Long term security Increased availability of cheap, powerful hardware New threats and attacks appear, new interfaces used for attacks Low entry barriers for hackers & criminals, e.g. spoofing, jamming, eavesdropping ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 7

Selected Strategy Bricks Systematically reduce complexity, increase reliability, robustness Strategies: Enforce overall system views, re-use mechanisms, application of safety & security patterns, new cryptographic techniques & algorithms New design tools Strategies: Safety & security co-analyses, new metrics, simulation for safety & security analyses, specification of building blocks for safe & secure systems Dynamic reconfiguration Strategies: Virtual components, connection establishment & release Robust control & self-diagnostics Strategies: Adapt under security attacks, react to random faults and unpredictable events, deal with sensor misinterpretations ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 8

Selected Strategy Bricks (2) Evaluation and experimentation Strategies: Extended simulation & test bed infrastructure, interfaces to human decision making New architectures Strategies: Integration of security by design, modularity and re-use of safe and secure components, secure HW building blocks, SW libraries & components Safe & secure real-time systems Strategies: Safe & secure fault diagnosis & maintenance, wireless protocols, dynamically reconfigurable systems, fault tolerance (Re-)Certification Strategies: Modular certification of composable designs, proof absence of high-impact failure modes, worst-case-execution time research ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 9

Selected Strategy Bricks (3) Identity & access management Strategies: Identity management & authentication mechanisms, key generation & management, anti-counterfeiting techniques, trusted devices Data protection Strategies: Protection & update in the field, transmission and distribution, E2E security, secure storage, protection agains HW trojans Safe & secure execution platforms Strategies: Trusted platform modules (TPM), trusted execution environments (TEE), embedded secure elements, secure boot processes Infrastructures Strategies: Vehicle interconnections (Car2X), infrastructure protection & monitoring, detection of abnormal behaviour, safe & secure behaviour ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 10

Selected Strategy Bricks (4) Cryptography Strategies: homomorphic encryption, quantum cryptography, post quantum cryptography Protocols Strategies: Mathematical analyses to design new scalable protocols for mass distribution (connected smart devices) Chip architecture Strategies: Design of monolithic or distributed secure enclaves, dedicated processors plus additional protection units ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 11

Impact Increased competition New markets Business success by absence of theft, fraud, closure, downtime New investments by saved costs Scalability effects High rated value-added chain by understanding and awareness Connected & smart systems: Products, applications, services, devices Smart cities Smart energy solutions Connected vehicles Smart grids Smart health care Safety & Security ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 12

Cross-References Safety & security are valid criteria for all applications addressed in the MASP Cyber-physical systems Smart systems integration Relevant for all MASP key applications (Smart X) Standardization activities: some examples ISO 26262: 2nd edition for automotive E/E engineering, Spring 2018 ISO PAS 21448 SOTIF (Safety of the intended functionality) SAE J3061: Cybersecurity Guidebook for Cyber-Physical Vehicle Systems, 19.1.2016 Rationale: To provide a cybersecurity process framework and guidance to help organizations identify and assess cybersecurity threats and design cybersecurity into cyber-physical vehicle systems throughout the entire development lifecycle process Relation to Safety: The process framework described in this document is analogous to the process framework described in ISO 26262 Functional Safety Road Vehicles. These two processes are different, but are related and require integrated communications in order to maintain consistency and completeness between an organizations safety process outputs and their Cybersecurity process outputs. ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 13

Roadmap: 2017 2019 2020+ 11 topics are currently adressed Safety, security & privacy by design Authentication Distributed models of trust Decentralized trust frameworks (blockchain) Data Protection Network Protection Safety and security risks related to infrastructures (systems of systems, cloud, new generation networks) Safe and secure execution platforms Safe and secure updates in the field Safety and security aware development Safe and secure services ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 14

Roadmap - Summary 11 topics adressed Example topic: Safety, security & privacy by design 2018-2019 2020+ Fully integrated requirements, frameworks, tools and standards Advanced authentication Unified computational trust models Continuous monitoring and certification Privacy and security by design Standardized models for most effective solutions Rollout of updateable systems 2017 Advanced security schemes & safety patterns Multiple authentication options Integration of secure architectures Deployment of trust models Secure data storage & management Safe & secure architectures, virtualization Increased automation in development Requirement specification Scenario definition Architecture analysis Theoretical model studies Existing technology evaluation Identification of criteria, threats, metrics Safety, security & privacy by design Requirement specification for safety, security, privacy and trust Advanced tools and methods to support security schemes and safety patterns for focused problem areas Fully integrated safety and security requirements & generic components and frameworks ARTEMIS-IA Brokerage Event 2017 D. Watzenig VIRTUAL VEHICLE 15

MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu